From the course: Kali Linux Essential Training

Unlock the full course today

Join today to access over 24,500 courses taught by industry experts.

Overview of exploitation tools

Overview of exploitation tools - Linux Tutorial

From the course: Kali Linux Essential Training

Overview of exploitation tools

- [Instructor] Just finding vulnerabilities in the target isn't sufficient. As professional penetration testers, we have to demonstrate that these weaknesses are exploitable, and as such, justify additional protection. Carly provides a number of exploitation tools that can be used to identify weaknesses, which allow unauthorized entry into systems. Let's take a look at two that we'll use a lot when doing our penetration testing. Metasploit is the foundation tool used by penetration testers for identifying weaknesses in systems and provides extensive capabilities for demonstrating them. It operates from a console interface, and it's supported by a large database of tests that can be selected and used to attempt to exploit a weakness. It can also interface with tools such as Nmap and Nessus to integrate information gathering. Hydra is a command line tool used to spray usernames and passwords as a target and check for those…

Contents